Sei sulla pagina 1di 7

RFID offers tantalizing benets for supply chain management, inventory control, and many other applications.

Find out whether your company could benet.


Ron Weinstein

RFID: A Technical Overview and Its Application to the Enterprise

adio frequency identification (RFID) has been around for decades. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them.A major push came when retailing giant Wal-Mart dramatically announced that it would require its top 100 suppliers to supply RFID-enabled shipments by January 2005. Though the bottom line story of that deployment has yet to surface, it does seem to support the inevitable movement of inventory tracking and supply chain management toward RFID. This article offers an RFID tutorial that answers the following questions: What is RFID, and how does it work? What are some applications of RFID? What are some challenges and problems in RFID technology and implementation? How have some organizations implemented RFID?

TECHNICAL OVERVIEW
The basic premise behind RFID systems is that you mark items with tags. These tags contain transponders that emit messages readable by specialized RFID readers. Most RFID tags store some sort of identication number; for example a customer number or product SKU (stock-keeping unit) code. A reader retrieves information about the ID number from a database, and acts upon it accordingly. RFID tags can also contain writable memory, which can store information for transfer to various RFID readers in different locations. This information can track the movement of the tagged item, making that information available to each reader (A Guide to Understanding RFID, RFID J., retrieved 27 Feb. 2005; http:// www.rdjournal.com/article/gettingstarted/). RFID tags fall into two general categories, active and passive, depending on their source of electrical power. Active RFID tags contain their own power source, usually an on-board battery. Passive tags obtain power from the signal of an external reader. RFID readers also come in active and passive varieties, depending on the type of tag they read.

Inside
US Navy RFID Pilot Resources for RFID Products

Answering these questions will provide an organizational framework for RFID implementation from both the technical and business perspectives.

Active tags
Because they have their own power source, active tags transmit a stronger signal, and readers can access them from further away.The on-board
May June 2005 IT Pro 27

1520-9202/05/$20.00 2005 IEEE

Published by the IEEE Computer Society

NEW

TECHNOLOGY

A passive-tag reader can constantly broadcast its signal or broadcast it on demand. When a tag comes within the readers range, it receives an electromagnetic signal from Passive RFID tag the reader through the tags 3. When the antenna. The tag then stores capacitor has the energy from the signal built up RFID enough energy, it in an on-board capacitor, a reader 1. RFID reader releases it over process called inductive coubroadcasts time to the pling.When the capacitor has electromagnetic tags coils. signal to tag. built up enough charge, it can power the RFID tags cir2. Antenna in the tag cuitry, which transmits a modreceives the signal ulated signal to the reader. from the reader and That return signal contains stores charge in a capacitor. the information stored in the tag. 4. The tags coils release an encoded radio The communication bewave containing the information in the tag, tween the reader and passive which the reader then demodulates. tag uses one of two methods to modulate the ID signal. Low-frequency (less than 100 MHz) tags pass information by releasing energy from the power source makes them larger and more expensive, so capacitor to the tag coils in varying strengths over time, active RFID systems typically work best on large items which affects the radio frequency emitted by the tag. The tracked over long distances. Low-power active tags are reader detects these varying waves and can use these variusually slightly larger than a deck of playing cards.Active ances to demodulate the code. Figure 1 shows this load tags can remain dormant until they come in range of a modulation. receiver or can constantly broadcast a signal. In higher-frequency (greater than 100 MHz) tags, the tag Because of their on-board power source, active tags opertransmits the signal using backscatter, in which the tags ate at higher frequenciescommonly 455 MHz, 2.45 GHz, circuit changes the resistance of the tags antenna. This or 5.8 GHzdepending on the applications read range change in resistance causes a transmission of RF waves, and memory requirements. Readers can communicate with which the reader can pick up and demodulate. Passive tags active RFID tags across 20 to 100 meters. typically operate at frequencies of 128 KHz, 13.6 MHz, 915 MHz, or 2.45 GHz, and have read ranges of a few inches Passive tags to 30 feet. Frequency choice depends on the systems enviPassive tags, on the other hand, are very inexpensive; ronment, what material the signal must travel through, and they can cost as little as 20 cents apiece, and new techthe systems required read range. nologies are constantly making them cheaper to integrate RFID tags can be encased in many materials. Plastics are into common materials and products. Because passive tags a very common material for RFID, forming identication are inexpensive, they will likely be the basis of most of the cards for building access, credit cards, or bus fares.Tags can growth in RFID implementations, so I will examine the also go on the back of labels printed on standard ink jet technology behind passive tags in detail. printers, for placement on inventory. In addition to their low cost, passive tags can also be quite small. Current antenna technology limits the smallest useful passive tag to about the size of a quarter. The STANDARDS larger the tag, the larger the read range. Several RFID standards exist, and their applications are Currently, passive RFID tags contain about 2 Kbits of under debate within the RFID development community. memory. This is too small to hold much more complex These standards cover information than identication and history information. The technology behind RFID is constantly improving, so identication, the coding of unique item identiers, or the amount of information and capabilities of RFID tags other data on the RF tag; will increase over time, allowing RFID tags to eventually data and system protocols, effectively the middleware contain and transmit much more information. of an RFID system;

Figure 1. Simplied view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).

28

IT Pro May June 2005

the air interface, that is, the wireless communication between the reader and the tag; application support, which provides advice about how to implement the technology; testing, compliance, and health and safety, that is, the rules that govern RFID operations; and terminology.

US Navy RFID Pilot


In May 2004, the US Navy nished its pilot of a passive-RFID system to support the loading of supplies into cargo containers. The pilot project took place at the Fleet and Industrial Supply Center (FISC) in Norfolk, Virginia; the original goal was to reduce the number of errors in records of supplies loaded into the containers.These errors arose from manual and/or nominally automated data inputs in the standing process. For the pilot, FISC used passive tags read as a forklift carrying the supplies (shipments) passed through specially equipped portals. In all, FISC spent $306,000, or 93 cents per shipment during this pilot. In its final configuration, the RFID-enhanced process also increased the speed and efciency of the cargo checking process. Although the pilots goal did not include a return-on-investment justication, the nal report indicates that as many as twelve additional personnel could conceptually be assigned as additional drivers, or to work in other functions within the operation because monitoring the RFID pilot system did not require as many people as the legacy system. In the process, FISC learned several valuable lessons that would apply to similar RFID deployments. The report Final Report of the Passive Radio-Frequency Identification (RFID) Project at the Fleet and Industrial Supply Center, Norfolk, Virginia, Ocean Terminal describes those lessons and the pilot project in detail (http://www.acq.osd.mil/log/logistics_ materiel_readiness/organizations/sci/rd/assetts/Meetings/FISC% 20Norfolk%20OT%20Report%20v8.pdf).

The International Standards Organization (ISO) has three standards for RFID: ISO 14443 (for contactless systems), ISO 15693 (for vicinity systems, such as ID badges), and ISO 18000 (to specify the air interface for a variety of RFID applications). A not-for-profit organization, EPCglobal, has developed a widely accepted standard for product identification. The Electronic Product Code (EPC) standard covers the air interfaces, the format for the product identication data stored in an RFID tag, and the middleware and databases storing information about the tags. The US Department of Defense now requires suppliers to use RFID on lowest possible piece part/case/pallet packaging once the suppliers contract contains language regarding the requirement (http://www. dodrd.org).The DoD species EPCglobal or compatible tags. In 2004, the DoD ran a eld test RFID deployment, as the US Navy RFID Pilot sidebar describes. EPCglobal has developed a system called the Object Naming Service (ONS) that is similar to the Domain Name Service (DNS) used on the Internet. ONS acts as a directory service for organizations wishing to look up product numbers (also known as EPC numbers) on the Internet. EPCglobal awarded VeriSign a contract to manage ONS in January 2004. (VeriSign to Run EPC Directory, RFID J., 13 Jan. 2004; http://www.rdjournal.com/article/view/ 735/). In reports dated January, 2004, Wal-Mart, though a member company of EPCglobal, reported that it has no plans to use the ONS service, opting to use its own proprietary database and formats. In terms of the all important air interface, ISO 18000 and the EPC standard were incompatible. However, in January 2005, EPCglobal submitted its UHF Class 1 Generation 2 Specication for possible inclusion in the ISO standards. The National RFID Centre, an initiative of the UK Department of Trade and Industry, hailed the move as a much needed convergence of international RFID standards (Convergence of RFID Standardisation Efforts, 13 Jan. 2005, http://www.rfiduk. org/news/view. php?id=3).

Sign Up Today for the IEEE Computer Societys e-News


Be alerted to
articles and special issues conference news registration deadlines

Available for FREE to members.

computer.org/e-News

NEW

TECHNOLOGY

Figure 2. Common devices that employ RFID.

A reader collects detail information in one pass, without having to scan each product. Tags can store more data than bar codes. The last capability has several interesting applications in supply chain management. For example, read-write tags can store information about their environment. They can physically store their position and time throughout their movement in the supply chain. An example of a proposed use of RFID is to ensure safety in the supply chain. A US Food and Drug Administration (FDA) proposal supports using RFID to ensure the authenticity of prescription drugs. In this system, each drug shipment would carry a read-only RFID tag containing a unique serial number. Suppliers would track these serial numbers in shipment and have the drug purchaser verify the numbers on receipt, ensuring that the drugs came from where they were expected and arrived at their intended point of sale. The FDA realized that this is rather difcult to implement in such a large and supply chain as that for prescription drugs and proposed a three-year schedule for investigating the technology, ending in 2007, before it sets any policies (Combating Counterfeit Drugs, US Food and Drug Administration, Feb. 2004; http://www.fda.gov/oc/initiatives/counterfeit/report02_04.html#radiofrequency). A correlation to the supply chain management application is to enable automated just-in-time product shipments. If all products in a retail store and associated warehouses have RFID tags, a store should have an accurate database of its inventory. Systems in retail outlets could automatically alert a warehouse management system that inventories are low. The warehouse management system could locate the products in the warehouse based on their initial scan, and automatically move them to a loading dock for shipping to the retail outlet.Wal-Mart is implementing such a system.

Some car keys (upper left) contain a passive tag. An EzPass (upper right) helps collect highway tolls, a SmarTrip card (bottom) collects fares in a public transit system.

BUSINESS APPLICATIONS
RFID applications are numerous and far reaching. The most interesting and widely used applications include those for supply chain management, security, and the tracking of important objects and personnel.

Supply chain management


In supply chain management, RFID tags are used to track products throughout the supply chainfrom supplier delivery, to warehouse stock and point of sale. New applications target tracking from checkout through customer billing. A central database records product movement, which manufacturers or retailers can later query for location, delivery conrmation, or theft prevention. For this application, RFID basically serves as a replacement for the bar code scanners used to track products and shipments in similar ways. Gao and colleagues outlines four ways in which RFID is superior to bar codes for tracking inventory ow over the supply chain (An Approach to Security and Privacy of RFID System for Supply Chain, X. Gao and colleagues, Proc. IEEE Intl Conf. E-Commerce Technology for Dynamic E-Business, 2004): RFID does not require line-of-sight access to read the tag. The read range of RFID is larger than that of a bar code reader. Readers can simultaneously communicate with multiple RFID tags. Because of this capability, an RFID reader can capture the contents of an entire shipment as it is loaded into a warehouse or shipping container.
30 IT Pro May June 2005

Security
Security and personal identication applications are a major and broad application of RFID. A common use of RFID is in identication cards to control building access. Many organizations use RFID tags embedded in ID cards, which are readable at a building entrance. On a similar note, some credit cards (American Express ExpressPay, http://www.americanexpress.com/expresspay) and other payment devices, such as ExxonMobils Speedpass (http://www.speedpass.com), use RFID tags. Other cards use tags for automatic fare payment in mass-transit systems, such as the SmarTrip card for the Washington DC area subway and bus system (http://www.wmata.com/ riding/smartrip.cfm). Figure 2 shows samples of such cards. Essentially, these are a replacement for identication cards with magnetic stripes, providing a more reliable way to store identication informationmagnetic stripes tend to wear out and lose information over time. RFID tags also have a higher memory capacity than magnetic stripes.

Keys for new cars also incorporate passive RFID tags that work with a reader near the cars ignition switch.The reader will only accept codes stored in certain keys. If the code in a key does not match the reader in the car, the car will not start, making it more difcult to steal vehicles by copying keys.

Resources for RFID Products


Association for Automatic Identication and Mobility (AIM, http://www.aimglobal.org/technologies/rd): A trade association, AIM focuses on automatic identification; its site includes a buyers guide to RFID hardware and a solution provider evaluation guide. RFID Gazette (http://www.rfidgazette.org): A blog, the Gazette reviews RFID products and implementations. Sybase RFID Platform (http://www.sybase.com/rfid): An example RFID middleware implementation. The RFID Handbook (http://rd-handbook.com): The home page for the book contains links to many companies providing RFID products and solutions.

Movement tracking

Because moving objects can easily carry RFID tags, a common use is to track the movement of people and the information associated with them. Some hospitals now use tags on newborns, to ensure identication and to alert hospital staff should someone attempt to take the baby outside of the hospital without authorization. Some schools are requiring children to wear tag-embedded bracelets or wrist bands while on school grounds, to monitor attendance Tutorials and to locate lost children (Tagging Toddlers A Guide to Understanding RFID, RFID J.; http://www. and Toothpaste, Information Management J., rdjournal.com/article/gettingstarted/. Sept.-Oct. 2004).The FDA recently approved a RFID 101, W. Singer, Logistics Today, Nov. 2004. RFID tag that could stay with surgical patients The Magic of RFID, R. Want, ACM Queue, Oct. 2004. in hospitals and store information on the surgical procedure the person requires, eliminating surprisingly common surgical mistakes (FDA Approves Surgical ID Tag, S. Lawrence, eWeek, Nov. 2004; ing habits automatically tracked electronically. Many prihttp://www.eweek.com/article2/0,1759,1731402,00.asp). vacy groups are concerned about the ability to identify This application of RFID has obvious privacy issues, as I people as they walk through a store or shopping center via will discuss later. the tags embedded in their clothing and linked to them at In the same way, tags can track the movement of highly the time of purchase. mobile objects in areas other than an organizations supTo counter such concerns, RFID proponents propose ply chain. For example, one large Las Vegas casino plans that retail tags have kill switches that disable the tag at to place passive tags in each gaming chip, and have readthe point of sale. Even though a small tag might remain ers at cashier stations and gaming tables. In this way, the embedded inside a product, once the kill switch is acticasino can detect counterfeit chips, and track the movevated, the tag would no longer transmit information ment of chips and player activity (Vegas Casino Bets (Some Methods for Privacy in RFID Communication, R. on RFID, A. Gilbert, 9 Feb. 2005, http://news.com. Fishkin and B. Jiang, Intel Research; http:// www.intelcom/Vegas+casino+bets+on+RFID/2100-7355_3-5568288. research.net/Publications/Seattle/ html?tag=nefd.top). 062420041517_243.pdf). Hospitals are also using RFID to track equipment Many of the privacy concerns regarding RFID are throughout a facility as it moves from room to room.This addressable because of the nature of RFID tags themhelps manage inventory and ensure the proper mainteselves. The read range of RFID tags is much too small to nance of equipment. Libraries also tag books, making it allow readers out of personal range to read tags carried on possible to easily locate a book in the stacks, prevent theft, a person or in a vehicle. Also, building materials tend to and automate the checkout process. absorb the relatively weak RF waves transmitted by passive tags, making it extremely difcult to pick up RFID signals through the walls of a home (RFID Privacy CHALLENGES AND ISSUES IN RFID Workshop: Concerns, Consensus, and Questions, S.Weiss, Although promising, RFID is not without its challenges, IEEE Security & Privacy, Mar.-Apr. 2004). which arise from both a technological and usage point of However, anytime someone automatically stores and view. tracks personal identication in electronic databases, privacy concerns are very real. RFID tags used in transPrivacy concerns portation systemswhether for fare collection on mass A common concern with RFID is privacy. It is discontransit systems or automatic toll payment on bridges and certing for many people to have their movements or buyMay June 2005 IT Pro 31

NEW

TECHNOLOGY

highwaysallows for the easy and unprecedented tracking of movement. If you can pay for products in an RFID tag and companies later bill you automatically, it takes all possible anonymity out of the retail process. Companies and government agencies must address these concerns before the public will truly feel comfortable using RFID systems. People will want to see policies about the use of an RFID system and the information it collects.

If the tag cannot authenticate the readers identity, the tag will refuse to transmit the information it stores. Like most security tactics, this scheme is vulnerable to attacks, such as man in the middle, or reverse engineering.

Integration with legacy systems


Another challenge to RFID is its integration into existing systems. Several vendors are developing RFID middleware that will link new RFID systems into existing back-end infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If an organization picks a standard that changes or loses its market prevalence, middleware can transform the data from readers into the format supported by back-end systems. Many RFID middleware systems provide hooks into operational monitors, so organizations can monitor their tagged items in real time (RFID Anywhere: Leapfrogging the Challenges of RFID Deployment, Sybase Inc.; http:// sybase.com/detail?id=1034549). Middleware can provide the primary link between RFID readers and databases.

Security
Security is another key issue in RFID. An organization that implements RFID in its supply chain does not want competitors to track its shipments and inventory. People who use devices that carry personal nancial information, such as credit card or other ID numbers, do not want others to access their accounts. These are signicant security vulnerabilities in RFID. Some researchers have proposed schemes that would require tags to authenticate readers, transmitting information only to authorized readers.The tags would have to store ID numbers for authorized readers, and a reader would have to broadcast its ID to the tag. To protect the readers IDand prevent others from eavesdropping and stealing the informationthe reader uses either a xed or randomly generated number to hash (encrypt) its ID (Gao and colleagues).

WAL-MART: TAKING THE LEAD IN RFID FOR RETAIL


Of the many organizations having implemented RFID, the one that received the most media attention is Wal-Mart. The worlds largest retailer, Wal-Mart has one of the most

REACH HIGHER
Advancing in the IEEE Computer Society can elevate your standing in the profession. Application to Senior-grade membership recognizes ten years or more of professional expertise Nomination to Fellow-grade membership recognizes exemplary accomplishments in computer engineering

GIVE YOUR CAREER A BOOST


32 IT Pro May June 2005

UPGRADE YOUR MEMBERSHIP

www.computer.org/join/grades.htm

efcient supply chains in the world. With a large array of suppliers from many different industries,Wal-Marts RFID effort has the potential to cause a web of RFID implementations. One estimate puts Wal-Marts savings at $8.35 billion per year if it fully implemented RFID throughout its operations.That gure is more than the total revenue of half the companies on the Fortune 500 (Case Study:Wal-Marts Race for RFID, M. Roberti, eWeek, Sept. 2003; http://www.eweek.com/article2/0,1759,1492297, 00.asp). Though this savings is substantial, Wal-Mart has taken its RFID implementation fairly slowly. In 11 June 2003, Wal-Mart announced that it would require its top 100 suppliers to tag all cases and pallets by January 2005. This directive sent a wave of panic among suppliers, who scurried to learn about RFID and how best to implement the technology. Wal-Mart and its suppliers quickly found several challenges in its RFID implementation, namely that the UHF frequency they were using as a standard would not pass through many common products shipped to retail stores, such as water-based products and products shipped in metal packaging.This forced Wal-Mart to back off slightly and relax its deadline for full RFID implementation. By January 2005, the top 100 suppliers had only tagged about 60 percent of their products. Wal-Mart, though, was the first major retailer to implement RFID throughout the supply chain, and force its suppliers to implement RFID as well, so its natural to have some problems. Wal-Marts early adopter implementation forced the industry to learn about the challenges in RFID (Wal-Mart Gives Suppliers RFID Holiday Gift, E. Schuman, eWeek, Dec. 2004; http://www.eweek.com/article2/0,1759,1744834,00.asp). Wal-Mart provides information about its RFID efforts at http://www.walmartstores.com/wmstore/wmstores/ Mainsupplier.jsp?pagetype=supplier&categoryOID=10605 &catID=-8250&template=DisplayAllContents.jsp.

How to Reach IT Professional


Writers
We welcome submissions. For detailed information visit our Web site: http://www.computer.org/itpro/.

Products and Books


Send product and book announcements to itproducts@computer.org.

Letters to the Editor


Please provide an e-mail address or daytime phone number with your letter. Send letters to Letters, IT Pro, 10662 Los Vaqueros Cir., PO Box 3014, Los Alamitos, CA 90720-1314; fax +1 714 821 4010; itpro@computer.org.

On the Web
Visit http://computer.org for information about joining and becoming involved with the Society and IT Pro.

Magazine Change of Address


Send change-of-address requests for magazine subscriptions to address.change@ieee.org. Make sure to specify IT Pro.

Missing or Damaged Copies

FID, a technology existing for years, has potential uses in a variety of applications.Though not without issues and challenges, RFID is a promising technology which analysts expect to become ubiquitous in the coming years, helping organizations solve problems in supply chain management, security, personal identification, and asset tracking.

If you are missing an issue or received a damaged copy, contact help@computer.org.

Reprint Permission
To obtain permission to reprint an article, contact William Hagen, IEEE Copyrights and Trademarks Manager, at w.hagen@ieee.org. To buy reprints, see http://www.computer.org/author/reprint.htm.

Ron Weinstein is a graduate student at Johns Hopkins University. He also works for Sybase as a consultant. Contact him at ron@ronsweinstein.com

For further information on this or any other computing topic, visit our Digital Library at http://www.computer. org/publications/dlib.
May June 2005 IT Pro 33

Potrebbero piacerti anche